Discrete Dynamics in Nature and Society

VolumeÂ 2012Â (2012), Article IDÂ 106950, 8 pages

http://dx.doi.org/10.1155/2012/106950

## Propagation of Computer Virus under Human Intervention: A Dynamical Model

^{1}College of Computer Science, Chongqing University, Chongqing 400044, China^{2}School of Electronic and Information Engineering, Southwest University, Chongqing 400715, China

Received 13 May 2012; Accepted 7 June 2012

Academic Editor: YanbingÂ Liu

Copyright Â© 2012 Chenquan Gan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

This paper examines the propagation behavior of computer virus under human intervention. A dynamical model describing the spread of computer virus, under which a susceptible computer can become recovered directly and an infected computer can become susceptible directly, is proposed. Through a qualitative analysis of this model, it is found that the virus-free equilibrium is globally asymptotically stable when the basic reproduction number , whereas the viral equilibrium is globally asymptotically stable if . Based on these results and a parameter analysis, some appropriate measures for eradicating the spread of computer virus across the Internet are recommended.

#### 1. Introduction

Due to their striking features such as destruction, polymorphism, and unpredictability [1, 2], computer viruses have come to be one major threat to our work and daily life [3, 4]. With the rapid advance of computer and communication technologies, computer virus programs are becoming increasingly sophisticated so that developing antivirus software is becoming increasingly expensive and time-consuming [5]. Dynamical modeling of the spread process of computer virus is an effective approach to the understanding of behavior of computer viruses because, on this basis, some effective measures can be posed to prevent infection. In the past decade or so, a number of epidemic models (SEIR model [6, 7], SEIRS model [8], SIRS model [9â€“15], SEIQV model [16], SEIQRS model [17] and SAIR model [4], were simply borrowed to depict the spread of computer virus.

In reality, human intervention plays an important role in slowing down the propagation of computer viruses or preventing the breakout of computer viruses, under which a susceptible computer can become recovered directly, and an infected computer can become susceptible directly. To our knowledge, however, all the previous models did not consider the effect of human intervention.

In this paper, a new computer virus propagation model, which incorporates the above mentioned effects of human intervention, is proposed. The dynamics of this model are investigated. Specifically, the virus-free equilibrium is globally asymptotically stable when the basic reproduction number , whereas the viral equilibrium is globally asymptotically stable if . Based on these results and a parameter analysis, some effective strategies for eradicating computer viruses are advised.

The subsequent materials of this paper are organized as follows: Section 2 formulates the model; Section 3 shows the global stability of the virus-free equilibrium; Section 4 proves the global stability of the viral equilibrium; Some policies are posed in Section 5 for controlling virus spread; finally, this work is summarized in Section 6.

#### 2. Assumptions and Model Formulation

At any given time, computers all over the world are classified as *internal* or *external* depending on whether it is currently accessing to the Internet or not, and all internal computers are further categorized into three classes: (1) *susceptible* computers, that is, virus-free computers having no immunity; (2) *infected* computers; (3) *recovered* computers, that is, virus-free computers having immunity. At time , let , , and denote the concentrations (i.e., percentages) of susceptible, infected, and recovered computers in all internal computers, respectively. Then . Without ambiguity, , , and will be abbreviated as , , and , respectively.

Our model is based on the following assumptions. (A1) All newly accessed computers are virus-free. Furthermore, due to the effect of newly accessed computers, at any time the percentage of susceptible computers increases by . (A2)At any time an internal computer is disconnected from the Internet with probability . (A3)Due to the effect of previously infected computers, at any time the percentage of infected computers increases by , where is a positive constant. (A4)Due to the effect of cure, at any time an infected computer becomes recovered with probability , or becomes susceptible with probability . (A5)Due to the loss of immunity, at any time a recovered computer becomes susceptible with probability . (A6)Due to the availability of new vaccine, at any time a susceptible computer becomes recovered with probability . This collection of assumptions can be schematically shown in Figure 1, from which one can derive the following model describing the propagation of computer virus: with initial conditions , and .

The * basicâ€‰*â€‰

*, , is defined as the average number of susceptible computers that are infected by a single infected computer during its life span. From the above model, one can derive the basic reproduction number as*

*reproduction*â€‰ numberBecause , system (2.1) simplifies to the following planar system: with initial conditions and . Clearly, the feasible region for this system is , which is positively invariant.

#### 3. The Virus-Free Equilibrium and Its Stability

System (2.3) always has a virus-free equilibrium . Next, let us consider its global stability by means of the Direct Lyapunov Method.

Theorem 3.1. * is globally asymptotically stable with respect to if .*

*Proof. *Let , then
Because and , we have . Moreover, if and only if . Thus, the claimed result follows from the LaSalle Invariance Principle.

*Example 3.2. *Consider a system of the form (2.3) and with , , , , , and . Then . By Theorem 3.1, the virus-free equilibrium is globally asymptotically stable. Figure 2 demonstrates how and evolve with time if and .

#### 4. The Viral Equilibrium and Its Stability

When , it is easy to verify that system (2.3) has a unique viral equilibrium , where

First, consider the local stability of .

Theorem 4.1. * is locally asymptotically stable if .*

*Proof. *For the linearized system of system (2.3) at , the corresponding Jacobian matrix is
The characteristic equation of is
where
It follows from the Hurwitz criterion that the two roots of (4.3) have negative real parts. Hence, the claimed result follows.

We are ready to study global stability of . Let , then we have as following.

Theorem 4.2. * is globally asymptotically stable with respect to if .*

*Proof. *From system (2.3), we have
Note that
Define the Lyapunov function as
where . Then
If , because , thus
If , from (4.5) we get
Hence, we have
Furthermore, it is easy to see that , and if and only if . Hence, the claimed result follows from the LaSalle invariance principle.

*Example 4.3. *Consider a system of the form (2.3) and with , , , , , and . Then . It follows from Theorem 4.2 that the viral equilibrium is globally asymptotically stable. Figure 3 displays how and evolve with time if and .

#### 5. Discussions

As was indicated in the previous two sections, in order to eradicate computer viruses, one should take actions to keep below one.

From (2.2), it is easy to see that is increasing with , and is decreasing with , and , respectively. This implies that prevention is more important than cure, and higher disconnecting rate from the Internet contributes to the suppression of virus diffusion.

As a consequence, it is highly recommended that one should regularly update the antivirus software even if their computer is not noticeably infected, and timely disconnect the computer from the Internet whenever this connection is unnecessary. Also, filtering and blocking suspicious messages with firewall is rewarding.

#### 6. Conclusions

By considering the possibility that an infected computer becomes susceptible as well as the possibility that a susceptible computer becomes recovered, a new computer virus propagation model has been proposed. The dynamics of this model has been fully studied. On this basis, some effective measures for controlling the spread of computer viruses across the Internet have been posed.

#### Acknowledgment

The authors are greatly indebted to the anonymous reviewers for their valuable suggestions. This work is supported by the Natural Science Foundation of China (Grant no. 10771227), the Doctorate Foundation of Educational Ministry of China (Grant no. 20110191110022), and the Research Funds for the Central Universities (Grant nos. CDJXS12180007 and CDJXS10181130).

#### References

- F. Cohen, â€śComputer virus: theory and experiments,â€ť
*Computers & Security*, vol. 6, pp. 22â€“35, 1987. View at Google Scholar - F. Cohen,
*A Short Course on Computer Viruses*, John Wiley & Sons, New York, NY, USA, 2nd edition, 1994. - P. J. Denning,
*Computers Under Attack*, Addison-Wesley, Reading, Mass, USA, 1990. - J. R. C. Piqueira and V. O. Araujo, â€śA modified epidemiological model for computer viruses,â€ť
*Applied Mathematics and Computation*, vol. 213, no. 2, pp. 355â€“360, 2009. View at Publisher Â· View at Google Scholar Â· View at Zentralblatt MATH - P. S. Tippett, â€śThe kinetics of computer viruses replication: a theory and preliminary survey, in: safe computing,â€ť in
*Proceedings of the 4th Annual Computer Virus and Security Conference*, pp. 66â€“87, New York, NY, USA, March 1991. - B. K. Mishra and S. K. Pandey, â€śDynamic model of worms with vertical transmission in computer network,â€ť
*Applied Mathematics and Computation*, vol. 217, no. 21, pp. 8438â€“8446, 2011. View at Publisher Â· View at Google Scholar Â· View at Zentralblatt MATH - H. Yuan and G. Q. Chen, â€śNetwork virus-epidemic model with the point-to-group information propagation,â€ť
*Applied Mathematics and Computation*, vol. 206, no. 1, pp. 357â€“367, 2008. View at Publisher Â· View at Google Scholar Â· View at Zentralblatt MATH - B. K. Mishra and D. K. Saini, â€śSEIRS epidemic model with delay for transmission of malicious objects in computer network,â€ť
*Applied Mathematics and Computation*, vol. 188, no. 2, pp. 1476â€“1482, 2007. View at Publisher Â· View at Google Scholar Â· View at Zentralblatt MATH - X. Han and Q. L. Tan, â€śDynamical behavior of computer virus on internet,â€ť
*Applied Mathematics and Computation*, vol. 217, no. 6, pp. 2520â€“2526, 2010. View at Publisher Â· View at Google Scholar Â· View at Zentralblatt MATH - A. Lahrouz, L. Omari, D. Kiouach, and A. Belmaâti, â€śComplete global stability for an SIRS epidemic model with generalized non-linear incidence and vaccination,â€ť
*Applied Mathematics and Computation*, vol. 218, pp. 6519â€“6525, 2012. View at Google Scholar - B. K. Mishra and N. Jha, â€śFixed period of temporary immunity after run of anti-malicious software on computer nodes,â€ť
*Applied Mathematics and Computation*, vol. 190, no. 2, pp. 1207â€“1212, 2007. View at Publisher Â· View at Google Scholar Â· View at Scopus - B. K. Mishra and S. K. Pandey, â€śFuzzy epidemic model for the transmission of worms in computer network,â€ť
*Nonlinear Analysis: Real World Applications*, vol. 11, no. 5, pp. 4335â€“4341, 2010. View at Publisher Â· View at Google Scholar Â· View at Scopus - J. Ren, X. Yang, L. X. Yang, Y. Xu, and F. Yang, â€śA delayed computer virus propagation model and its dynamics,â€ť
*Chaos, Solitons & Fractals*, vol. 45, no. 1, pp. 74â€“79, 2012. View at Publisher Â· View at Google Scholar - J. Ren, X. Yang, Q. Zhu, L. X. Yang, and C. Zhang, â€śA novel computer virus model and its dynamics,â€ť
*Nonlinear Analysis: Real World Applications*, vol. 13, no. 1, pp. 376â€“384, 2012. View at Publisher Â· View at Google Scholar - C. Vargas-De-León, â€śOn the global stability of SIS, SIR and SIRS epidemic models with standard incidence,â€ť
*Chaos, Solitons & Fractals*, vol. 44, pp. 1106â€“1110, 2011. View at Google Scholar - F. W. Wang, Y. K. Zhang, C. G. Wang, J. F. Ma, and S. J. Moon, â€śStability analysis of a SEIQV epidemic model for rapid spreading worms,â€ť
*Computers & Security*, vol. 29, no. 4, pp. 410â€“418, 2010. View at Publisher Â· View at Google Scholar Â· View at Scopus - B. K. Mishra and N. Jha, â€śSEIQRS model for the transmission of malicious objects in computer network,â€ť
*Applied Mathematical Modelling*, vol. 34, no. 3, pp. 710â€“715, 2010. View at Publisher Â· View at Google Scholar Â· View at Zentralblatt MATH